How To Secure Your Cloud Hosting? Part 3

How To Secure Your Cloud Hosting? Part III

Authentication

For signing in to the cloud account AWS goes with mail id and password as the usual credentials. Rackspace goes with user id and password. AWS introduced Multi Factor Authentication long time back. Multi Factor Authentication involves an authentication device. Gemalto provides the compatible device. (See image of Gemalto device) When we sign in to our AWS Portal or AWS Console, access is granted when we give the authentication credentials of email id and password. When we opt in for AWS MFA (Amazon Web Service – Multi Factor Authentication) feature, access will be granted only when the precise code from the authentication device is provided additionally. This is an extra protection. This protection given to AWS Management Console can be extended to EC2 Instances, CloudFront and S3 Versioning.

Securing Instances

In the case of AWS EC2, it is not that Quick Start Images are there but also community AMIs (Amazon Machine Instances), a several thousands of them. We found some of them already hardened with security features. These cover Windows and other Unix distros. When creating AWS instance, Key Pair and Security Zone are the two items required. Key Pair has to be named and downloaded to the computer.

Tip: Save the key pair in a secure place so that you can remember.

Only once can we get a Private Key. For the first time you access an instance this will be used.

In the case of Rackspace, the root password will be shown on the screen. Also, Rackspace sent an email containing an IP address and Password.

AWS Security Zone can be assumed as a firewall.

Tip: Security Zone settings are the ultimate decider that will over rule the other settings that we give in instances.

It is customary to choose default zone, when we are working on the first time. To harden the system, better to go for specific protocols and ip addresses specifically. If we name the security zones uniquely, we can use it for future instances.

We have done projects in the past one year with Gogrid, Microsoft Windows Azure, Amazon Web Services and Rackspace. The cloud services are continuously evolving with new features. We find that issues are being resolved continuously by service providers. Just for an example: We covered the issues involved in sending email from cloud.

On 25th Jan 2011, AWS announced the introduction of Simple Email Service. We can cover more on the security of cloud services related to SSH access, application/ code etc., in future posts.

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The IoT Machine Learning Shift While early artificial intelligence (AI) programs were a one-trick pony, typically only able to excel at one task, today it’s about becoming a jack of all trades. Or at least, that’s the intention. The goal is to write one program that can solve multi-variant problems without the need to be…

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…